Figure 5: Results of application of chaotic algorithm to SF.GIF. (a) and (d) original image. (b) Image resulting from encryption with L1 or L2, respectively, using two external encryption keys in the larger size. (c) and (f) Reconstructed image in each case.